Menu
Sign In Pricing Add Podcast
Podcast Image

Digital Social Hour

The Hidden Danger of Deleting Apps: Your Data Stays | Caitlin Sarian DSH #874

Sun, 10 Nov 2024

Description

🚨 Discover the hidden danger of deleting apps in this eye-opening episode of Digital Social Hour with Sean Kelly! πŸ“±βœ¨ Join the conversation with cybersecurity expert Caitlin Sarian as we dive into the critical mistake many make when uninstalling appsβ€”your data stays on their servers unless you actively request its deletion. 😱 Packed with valuable insights, Caitlin shares essential tips on protecting your personal information, from creating strong passwords to using VPNs and recognizing scams. πŸŒπŸ”’ Don't miss out on learning how to safeguard your digital life, especially with technology in the hands of children. πŸ‘ΆπŸ’» Tune in now and watch as we explore the intricacies of cybersecurity, revealing the truth behind apps and data. πŸ“Ί Hit that subscribe button and stay tuned for more eye-opening stories on the Digital Social Hour with Sean Kelly! πŸš€ Watch now and subscribe for more insider secrets. Join the conversation and become part of our digital community! πŸŽ™οΈ #DigitalSocialHour #SeanKelly #Podcast #Cybersecurity #CaitlinSarian #DataProtection #StaySafeOnline #passwordmanager #privacyvssecurity #cybersecurityinsights #gdpr #dataretention CHAPTERS: 00:00 - Intro 00:35 - Online Safety Tips 03:41 - Removing Personal Information Online 05:55 - Signs You've Been Hacked 07:15 - Understanding SIM Swapping 08:24 - Phone Number Tracking Risks 09:58 - Email Tracking Concerns 11:04 - Dating Profile Privacy Risks 15:22 - Webcam Hacking Threats 16:14 - Identifying Hacking Signs 18:33 - Blocking Unwanted Texts 19:28 - CrowdStrike Outage Overview 22:33 - Money Transfer Scams Explained 26:30 - Cyber Warfare Insights 29:51 - Social Media Security 30:44 - Final Thoughts on Cybersecurity 30:58 - Scam Prevention Strategies 31:54 - Avoiding Suspicious Links APPLY TO BE ON THE PODCAST: https://www.digitalsocialhour.com/application BUSINESS INQUIRIES/SPONSORS: [email protected] GUEST: Caitlin Sarian https://www.instagram.com/cybersecuritygirl/ https://www.cybersecuritygirl.com/ https://www.youtube.com/@CybersecurityGirl LISTEN ON: Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-social-hour/id1676846015 Spotify: https://open.spotify.com/show/5Jn7LXarRlI8Hc0GtTn759 Sean Kelly Instagram: https://www.instagram.com/seanmikekelly/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

Audio
Featured in this Episode
Transcription

Chapter 1: What are the hidden dangers of deleting apps?

1.178 - 14.401 Host

I will say one thing people don't realize is if you do sign up for those accounts, a lot of people think that they delete those accounts when they delete the app, but they don't. So that's like one really important thing. Like when I tell people, people just delete the app and think it like disappears. Your data is still there.

0

Chapter 2: How can you protect your personal information online?

14.861 - 25.943 Host

So unless you were like request to delete your account from them, like you actively email them or you put in a request and they confirm and then you delete that app, it's still sitting there on their servers.

0

29.522 - 33.003 Host

All right, guys, here with Caitlin Sarian here today. We're talking cybersecurity. Thanks for coming on.

0

33.143 - 34.363 Host

Yeah, thanks for having me. Excited.

0

Chapter 3: What are the signs that you've been hacked?

34.604 - 41.386 Host

Yeah, I think what you're teaching is very useful these days, especially people having kids. Yeah. You know, all these weird cases coming up.

0

Chapter 4: What risks are associated with SIM swapping?

41.706 - 47.668 Host

I know. I honestly didn't realize it was like this big of a deal until some of my videos started going viral. And I was like, wow, actually, people need to know this.

0

47.708 - 51.909 Host

No, it's a big deal. I mean, kids are just freely getting iPads and iPhones in first grade now.

0

52.543 - 56.465 Host

Exactly. We're literally given technology before we can speak and no one's ever taught us how to use it.

0

Chapter 5: How can you track your phone number and protect it?

56.585 - 63.108 Host

Yeah. So let's start with the basics on like ways to protect yourself, I guess, and specifically kids, because I feel like that's a big issue right now.

0

Chapter 6: What are the best practices for creating strong passwords?

63.536 - 79.304 Host

Yeah. So, I mean, just for starters, you want to create like strong passwords. And that's like, I hate saying that because I want to hit my head against the wall every time. I think everyone says that, but it's super, super important. And a lot of people think, oh, if I have one really strong password, you know, that'll be fine.

0

79.364 - 100.033 Host

And it's not because once that password is leaked, there are a lot of ways for hackers to just use that password and try a bajillion different ways and get into all your different accounts. So that's to start. The other thing is software updates, which I know is very controversial. A lot of people will reference that Apple would slow the phones down. That's one time.

0

100.353 - 113.941 Host

Software updates are super important. They fix a lot of bugs and what we like to call zero day vulnerabilities or things that are vulnerable to that app. And so you want to make sure that they're updated constantly. The other thing is like open Wi-Fi networks.

0

Chapter 7: How does using a VPN enhance your online security?

114.021 - 126.932 Host

If there's not a password and you're like connected to a Starbucks and you're on, you know, banking apps, like strongly suggest you do not do that and make sure that you log on to a Wi-Fi that actually has a password.

0
0

128.072 - 147.027 Host

And also a lot of times people think, oh, well, there's a password. I'm just going to give Delta Lounge as an example. Delta Lounge has had the same password for like six months. So it really doesn't do that much good at that point. And so what you want to do is if you are connecting to kind of weaker systems, you want to get a VPN or a virtual private network.

0

Chapter 8: What should you know about webcam hacking and privacy?

147.447 - 157.395 Host

It just encrypts the data going back and forth. Basically, it means that they can't read. If they get into that network, they can't read what's going back and forth on your system. So you're protecting yourself.

0

157.555 - 162.341 Host

Great advice. I see those VPN ads on podcasts all the time. So Nord and Express, those are good to use.

0

162.381 - 175.095 Host

Yeah. And you can use multiple. So a lot of cybersecurity experts use multiple because sometimes you can kind of figure out that you're using a VPN if you're really trying to like dig deeper. But yeah, any of those are fine.

0

175.556 - 177.078 Host

What about incognito mode? Is that safe?

0

177.378 - 191.847 Host

Incognito mode is mostly for yourself. It's not for other websites. They're still kind of collecting general information on you and a lot of times they're still collecting IP too. So incognito mode is really for your computer to forget where it went. So it's not saving it.

191.887 - 206.954 Host

So for example, if you want to buy a gift for your girlfriend and you don't want her to know that you went on that website, go on incognito mode because she won't see your search history. But it's really for your personal preferences. It's not really that incognito for the rest of the websites that you go on.

206.994 - 218.239 Host

And a lot of people think, oh, if I go on incognito mode and I go on Facebook, anything that you have to log into on incognito mode, it's still going to be tracking you because you're logged into that system. So it doesn't actually do very much.

218.259 - 220.18 Host

People think everything they do on incognito is hidden.

220.36 - 221.84 Host

It's not. It's not.

Comments

There are no comments yet.

Please log in to write the first comment.